security

One of the FBI's Most Wanted Hackers Is Trolling the US Government – Slashdot


An anonymous reader quotes a report from TechCrunch: Earlier this year, the U.S. government indicted Russian hacker Mikhail Matveev, also known by his online monikers “Wazawaka” and “Boriselcin,” accusing him of being “a prolific ransomware affiliate” who carried out “significant attacks” against companies and critical infrastructure in the U.S. and elsewhere. The feds also accused him of being a “central figure” in the development and deployment of the notorious ransomware variants like Hive, LockBit, and Babuk. Matveev is such a prominent cybercriminal that the FBI designated him as one of its most wanted hackers. Matveev, who the FBI believes he remains in Russia, is unlikely to face extradition to the United States.

For Matveev, however, life seems to go on so well that he is now taunting the feds by making a T-shirt with his own most wanted poster, and asking his Twitter followers if they want merch. When reached by TechCrunch on X, formerly Twitter, Matveev verified it was really him by showing a picture of his left hand, which has only four fingers, per Matveev’s FBI’s most wanted page. Matveev also sent a selfie holding a piece of paper with this reporter’s name on it.

After he agreed to do an interview, we asked Matveev a dozen questions about his life as a most wanted hacker, but he didn’t answer any of them. Instead, he complained that we used the word “hacker.” “I don’t like this designation — hacker, we are a separate type of specialist, practical and using our knowledge and resources without water and writing articles,” he wrote in an X direct message. “I was interested only in terms of financial motivation, roughly speaking, I was thinking about what to do, sell people or become. it, [sic] let me tell you how I lost my finger?” At that point, Matveev stopped answering messages.

Readers Also Like:  Louisiana Tech stabbing: 4 victims identified, two in critical condition - Ruston Daily Leader



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.